Removed now useless calls to .toString() on arguments of Logger.*(...).
| | |
| | | :extensions => ["java"], |
| | | :replacements => |
| | | [ |
| | | # Need to fix removing the last parentheses |
| | | /(logger\.\s*(trace|debug|warn|info|error)\s*\([^;]*)\s*String\s*\.\s*valueOf\s*\(/m, |
| | | /([A-Z0-9_]+\s*\.\s*get\s*\([^;]*)\.toString\(\)/m, |
| | | /(logger\.\s*(trace|debug|warn|info|error)\s*\([^;]*)\s*\.toString\(\)/m, |
| | | '\1', |
| | | ] |
| | | } |
| | |
| | | } |
| | | |
| | | # List of replacements to run |
| | | REPLACEMENTS = [ LOGGER_STRING_VALUEOF ] |
| | | #REPLACEMENTS = [ MESSAGES, TYPES, DN_TYPES, EXCEPTIONS, LOGGERS, I18N_LOGGERS ] |
| | | REPLACEMENTS = [ LOGGER_TOSTRING ] |
| | | |
| | | |
| | | ################################### Processing methods ######################################## |
| | |
| | | { |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("Attribute %s resolves to true for user entry " |
| | | + "%s", attributeType.getNameOrOID(), |
| | | entry.getName().toString()); |
| | | logger.trace("Attribute %s resolves to true for user entry %s", |
| | | attributeType.getNameOrOID(), entry.getName()); |
| | | } |
| | | |
| | | return ConditionResult.TRUE; |
| | |
| | | { |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("Attribute %s resolves to false for user " |
| | | + "entry %s", attributeType.getNameOrOID(), entry.getName() |
| | | .toString()); |
| | | logger.trace("Attribute %s resolves to false for user entry %s", |
| | | attributeType.getNameOrOID(), entry.getName()); |
| | | } |
| | | |
| | | return ConditionResult.FALSE; |
| | |
| | | { |
| | | logger.trace("Unable to resolve value %s for attribute %s " |
| | | + "in user entry %s as a Boolean.", valueString, |
| | | attributeType.getNameOrOID(), entry.getName().toString()); |
| | | attributeType.getNameOrOID(), entry.getName()); |
| | | } |
| | | |
| | | final LocalizableMessage message = ERR_PWPSTATE_CANNOT_DECODE_BOOLEAN |
| | |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("Returning %s because attribute %s does not exist " |
| | | + "in user entry %s", ConditionResult.UNDEFINED.toString(), |
| | | attributeType.getNameOrOID(), entry.getName().toString()); |
| | | + "in user entry %s", ConditionResult.UNDEFINED, |
| | | attributeType.getNameOrOID(), entry.getName()); |
| | | } |
| | | |
| | | return ConditionResult.UNDEFINED; |
| | |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.traceException(e); |
| | | |
| | | logger.trace("Unable to decode value %s for attribute %s " |
| | | + "in user entry %s: %s", v.getValue().toString(), |
| | | attributeType.getNameOrOID(), entry.getName().toString(), |
| | | + "in user entry %s: %s", v.getValue(), attributeType.getNameOrOID(), entry.getName(), |
| | | stackTraceToSingleLineString(e)); |
| | | } |
| | | |
| | |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("Returning -1 because attribute %s does not " |
| | | + "exist in user entry %s", attributeType.getNameOrOID(), entry |
| | | .getName().toString()); |
| | | + "exist in user entry %s", attributeType.getNameOrOID(), entry.getName()); |
| | | } |
| | | } |
| | | // FIXME: else to be consistent... |
| | |
| | | { |
| | | logger.trace("User %s is considered administratively " |
| | | + "disabled because an error occurred while " |
| | | + "attempting to make the determination: %s.", userEntry.getName() |
| | | .toString(), stackTraceToSingleLineString(e)); |
| | | + "attempting to make the determination: %s.", userEntry.getName(), |
| | | stackTraceToSingleLineString(e)); |
| | | } |
| | | |
| | | return true; |
| | |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("User %s is not administratively disabled since " |
| | | + "the attribute \"%s\" is not present in the entry.", userEntry |
| | | .getName().toString(), OP_ATTR_ACCOUNT_DISABLED); |
| | | + "the attribute \"%s\" is not present in the entry.", userEntry.getName(), OP_ATTR_ACCOUNT_DISABLED); |
| | | } |
| | | return false; |
| | | } |
| | | |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("User %s %s administratively disabled.", userEntry |
| | | .getName().toString(), ((isDisabled == ConditionResult.TRUE) ? " is" |
| | | : " is not")); |
| | | logger.trace("User %s is%s administratively disabled.", userEntry.getName(), |
| | | (isDisabled == ConditionResult.TRUE ? "" : " not")); |
| | | } |
| | | |
| | | return isDisabled == ConditionResult.TRUE; |
| | |
| | | StaticUtils.byteArrayToHexPlusAscii(builder, key.getData(), 4); |
| | | logger.trace("Index entry exceeded in index %s. " + |
| | | "Limit: %d. ID list size: %d.\nKey:%s", |
| | | name, indexEntryLimit, entryIDList.size(), |
| | | builder.toString()); |
| | | |
| | | name, indexEntryLimit, entryIDList.size(), builder); |
| | | } |
| | | } |
| | | |
| | |
| | | { |
| | | StringBuilder builder = new StringBuilder(); |
| | | StaticUtils.byteArrayToHexPlusAscii(builder, key.getData(), 4); |
| | | logger.trace( |
| | | "The expected key does not exist in the index %s.\nKey:%s ", |
| | | name, builder.toString()); |
| | | logger.trace("The expected key does not exist in the index %s.\nKey:%s ", name, builder); |
| | | } |
| | | } |
| | | |
| | |
| | | { |
| | | StringBuilder builder = new StringBuilder(); |
| | | StaticUtils.byteArrayToHexPlusAscii(builder, key.getData(), 4); |
| | | logger.trace( |
| | | "The expected key does not exist in the index %s.\nKey:%s ", |
| | | name, builder.toString()); |
| | | logger.trace("The expected key does not exist in the index %s.\nKey:%s ", name, builder); |
| | | } |
| | | |
| | | setTrusted(txn, false); |
| | |
| | | StaticUtils.byteArrayToHexPlusAscii(builder, key.getData(), 4); |
| | | logger.trace("Index entry exceeded in index %s. " + |
| | | "Limit: %d. ID list size: %d.\nKey:%s", |
| | | name, indexEntryLimit, idCountDelta + addedIDs.size(), |
| | | builder.toString()); |
| | | name, indexEntryLimit, idCountDelta + addedIDs.size(), builder); |
| | | |
| | | } |
| | | } |
| | |
| | | { |
| | | StringBuilder builder = new StringBuilder(); |
| | | StaticUtils.byteArrayToHexPlusAscii(builder, key.getData(), 4); |
| | | logger.trace( |
| | | "The expected key does not exist in the index %s.\nKey:%s", |
| | | name, builder.toString()); |
| | | logger.trace("The expected key does not exist in the index %s.\nKey:%s", name, builder); |
| | | } |
| | | |
| | | setTrusted(txn, false); |
| | |
| | | { |
| | | StringBuilder builder = new StringBuilder(); |
| | | StaticUtils.byteArrayToHexPlusAscii(builder, key.getData(), 4); |
| | | logger.trace( |
| | | "The expected key does not exist in the index %s.\nKey:%s", |
| | | name, builder.toString()); |
| | | logger.trace("The expected key does not exist in the index %s.\nKey:%s",name, builder); |
| | | } |
| | | |
| | | setTrusted(txn, false); |
| | |
| | | StringBuilder builder = new StringBuilder(); |
| | | StaticUtils.byteArrayToHexPlusAscii(builder, key.getData(), 4); |
| | | logger.trace("The expected entry ID does not exist in " + |
| | | "the entry ID list for index %s.\nKey:%s", |
| | | name, builder.toString()); |
| | | "the entry ID list for index %s.\nKey:%s", name, builder); |
| | | } |
| | | |
| | | setTrusted(txn, false); |
| | |
| | | { |
| | | StringBuilder builder = new StringBuilder(); |
| | | StaticUtils.byteArrayToHexPlusAscii(builder, key.getData(), 4); |
| | | logger.trace( |
| | | "The expected key does not exist in the index %s.\nKey:%s", |
| | | name, builder.toString()); |
| | | logger.trace("The expected key does not exist in the index %s.\nKey:%s", name, builder); |
| | | } |
| | | |
| | | setTrusted(txn, false); |
| | |
| | | |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("JE (%s) environment opened with the following " + |
| | | "config: %n%s", JEVersion.CURRENT_VERSION.toString(), |
| | | env.getConfig().toString()); |
| | | logger.trace("JE (%s) environment opened with the following config: %n%s", |
| | | JEVersion.CURRENT_VERSION, env.getConfig()); |
| | | |
| | | // Get current size of heap in bytes |
| | | long heapSize = Runtime.getRuntime().totalMemory(); |
| | |
| | | { |
| | | logger.trace("File id2children has ID %d with DN <%s> " + |
| | | "referencing ID %d with non-child DN <%s>%n", |
| | | entryID.longValue(), entry.getName().toString(), |
| | | id.longValue(), childEntry.getName().toString()); |
| | | entryID.longValue(), entry.getName(), id.longValue(), childEntry.getName()); |
| | | } |
| | | } |
| | | } |
| | |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("File id2subtree has ID %d with DN <%s> " + |
| | | "referencing ID %d with non-subordinate " + |
| | | "DN <%s>%n", |
| | | entryID.longValue(), entry.getName().toString(), |
| | | id.longValue(), subordEntry.getName().toString()); |
| | | "referencing ID %d with non-subordinate DN <%s>%n", |
| | | entryID.longValue(), entry.getName(), id.longValue(), subordEntry.getName()); |
| | | } |
| | | } |
| | | } |
| | |
| | | { |
| | | if(logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("Missing entry %s in VLV index %s", |
| | | entry.getName().toString(), |
| | | vlvIndex.getName()); |
| | | logger.trace("Missing entry %s in VLV index %s", entry.getName(), vlvIndex.getName()); |
| | | } |
| | | errorCount++; |
| | | } |
| | |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.traceException(e); |
| | | |
| | | logger.trace("Error reading VLV index %s for entry %s: %s", |
| | | vlvIndex.getName(), |
| | | entry.getName().toString(), |
| | | StaticUtils.getBacktrace(e)); |
| | | vlvIndex.getName(), entry.getName(), StaticUtils.getBacktrace(e)); |
| | | } |
| | | errorCount++; |
| | | } |
| | |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.traceException(e); |
| | | |
| | | logger.trace("Error reading VLV index %s for entry %s: %s", |
| | | vlvIndex.getName(), |
| | | entry.getName().toString(), |
| | | StaticUtils.getBacktrace(e)); |
| | | vlvIndex.getName(), entry.getName(), StaticUtils.getBacktrace(e)); |
| | | } |
| | | errorCount++; |
| | | } |
| | |
| | | } |
| | | else |
| | | { |
| | | logger.info(NOTE_JEB_REBUILD_CLEARDEGRADEDSTATE_FINAL_STATUS, rebuildConfig |
| | | .getRebuildList().toString()); |
| | | logger.info(NOTE_JEB_REBUILD_CLEARDEGRADEDSTATE_FINAL_STATUS, rebuildConfig.getRebuildList()); |
| | | } |
| | | |
| | | setRebuildListIndexesTrusted(true); |
| | |
| | | { |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("Could not create password policy subentry " |
| | | + "DN %s: %s", entry.getName().toString(), |
| | | stackTraceToSingleLineString(e)); |
| | | logger.trace("Could not create password policy subentry DN %s: %s", |
| | | entry.getName(), stackTraceToSingleLineString(e)); |
| | | } |
| | | } |
| | | } |
| | |
| | | { |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("Could not create password policy subentry " |
| | | + "DN %s: %s", newEntry.getName().toString(), |
| | | stackTraceToSingleLineString(e)); |
| | | logger.trace("Could not create password policy subentry DN %s: %s", |
| | | newEntry.getName(), stackTraceToSingleLineString(e)); |
| | | } |
| | | } |
| | | } |
| | |
| | | { |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("Could not create password policy subentry " |
| | | + "DN %s: %s", newEntry.getName().toString(), |
| | | stackTraceToSingleLineString(e)); |
| | | logger.trace("Could not create password policy subentry DN %s: %s", |
| | | newEntry.getName(), stackTraceToSingleLineString(e)); |
| | | } |
| | | } |
| | | } |
| | |
| | | |
| | | logger.trace("Unable to decode value %s for attribute %s" + |
| | | "in user entry %s: %s", |
| | | v.getValue().toString(), attributeType.getNameOrOID(), |
| | | v.getValue(), attributeType.getNameOrOID(), |
| | | userDNString, stackTraceToSingleLineString(e)); |
| | | } |
| | | |
| | |
| | | { |
| | | reason.append("there is no last login time, but "); |
| | | } |
| | | reason.append( |
| | | "the password changed time is in an acceptable window"); |
| | | reason.append("the password changed time is in an acceptable window"); |
| | | } |
| | | logger.trace("Returning false for user %s because %s.", |
| | | userDNString, reason.toString()); |
| | | logger.trace("Returning false for user %s because %s.", userDNString, reason); |
| | | } |
| | | } |
| | | else |
| | |
| | | { |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("The password provided for user %s failed " |
| | | + "validation: %s", userDNString, invalidReason.toString()); |
| | | logger.trace("The password provided for user %s failed validation: %s", |
| | | userDNString, invalidReason); |
| | | } |
| | | return false; |
| | | } |
| | |
| | | |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("Removing history value " + |
| | | v.getValue().toString() + " to preserve the history count."); |
| | | logger.trace("Removing history value %s to preserve the history count.", v.getValue()); |
| | | } |
| | | } |
| | | |
| | |
| | | |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("Removing history value " + |
| | | v.getValue().toString() + |
| | | " to preserve the history duration."); |
| | | logger.trace("Removing history value %s to preserve the history duration.", v.getValue()); |
| | | } |
| | | } |
| | | else |
| | |
| | | |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("Failed to retrieve password " + |
| | | "policy for user %s: %s", |
| | | entry.getName().toString(), |
| | | stackTraceToSingleLineString(de)); |
| | | logger.trace("Failed to retrieve password policy for user %s: %s", |
| | | entry.getName(), stackTraceToSingleLineString(de)); |
| | | } |
| | | } |
| | | |
| | |
| | | // entries should have at least the default password policy. |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("No applicable password policy for user %s", entry |
| | | .getName().toString()); |
| | | logger.trace("No applicable password policy for user %s", entry.getName()); |
| | | } |
| | | } |
| | | else if (policy.isPasswordPolicy()) |
| | |
| | | |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("Failed to retrieve password " + |
| | | "policy state for user %s: %s", |
| | | entry.getName().toString(), |
| | | stackTraceToSingleLineString(de)); |
| | | logger.trace("Failed to retrieve password policy state for user %s: %s", |
| | | entry.getName(), stackTraceToSingleLineString(de)); |
| | | } |
| | | } |
| | | |
| | |
| | | // Not a password policy, could be PTA, etc. |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("Authentication policy %s found for user %s is " |
| | | + "not a password policy", policy.getDN().toString(), entry |
| | | .getName().toString()); |
| | | logger.trace("Authentication policy %s found for user %s is not a password policy", |
| | | policy.getDN(), entry.getName()); |
| | | } |
| | | } |
| | | |
| | |
| | | |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("Failed to retrieve password " + |
| | | "policy for user %s: %s", |
| | | entry.getName().toString(), |
| | | stackTraceToSingleLineString(de)); |
| | | logger.trace("Failed to retrieve password policy for user %s: %s", |
| | | entry.getName(), stackTraceToSingleLineString(de)); |
| | | } |
| | | } |
| | | |
| | |
| | | // entries should have at least the default password policy. |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("No applicable password policy for user %s", entry |
| | | .getName().toString()); |
| | | logger.trace("No applicable password policy for user %s", entry.getName()); |
| | | } |
| | | } |
| | | else if (policy.isPasswordPolicy()) |
| | |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("Authentication policy %s found for user %s is " |
| | | + "not a password policy", policy.getDN().toString(), entry |
| | | .getName().toString()); |
| | | + "not a password policy", policy.getDN(), entry.getName()); |
| | | } |
| | | } |
| | | } |
| | |
| | | { |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("Adding end user recipient " + |
| | | v.getValue().toString() + " from attr " + |
| | | a.getNameWithOptions()); |
| | | logger.trace("Adding end user recipient %s from attr %s", |
| | | v.getValue(), a.getNameWithOptions()); |
| | | } |
| | | |
| | | recipients.add(v.getValue().toString()); |
| | |
| | | |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace(modifyOperation.getResultCode().toString()); |
| | | logger.trace("rc=%s", modifyOperation.getResultCode()); |
| | | } |
| | | } |
| | | catch (final DirectoryException e) |
| | |
| | | { |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("Skipping '" + modifyOperation.getEntryDN().toString() |
| | | + "' because it does not have Samba object class."); |
| | | logger.trace("Skipping '%s' because it does not have Samba object class.", modifyOperation.getEntryDN()); |
| | | } |
| | | return PluginResult.PreOperation.continueOperationProcessing(); |
| | | } |
| | |
| | | { |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("Result Code: " + |
| | | operation.getResultCode().toString()); |
| | | logger.trace("Result Code: %s", operation.getResultCode()); |
| | | } |
| | | |
| | | LocalizableMessage m = INFO_LDIF_CONNHANDLER_RESULT_CODE.get( |
| | |
| | | |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace( |
| | | message.toString()); |
| | | logger.trace("LDAPMessage=%s", message); |
| | | } |
| | | |
| | | if (keepStats) |
| | |
| | | ((search.getResultCode() != ResultCode.NO_SUCH_OBJECT))) |
| | | { |
| | | logger.error(ERR_ERROR_SEARCHING_RUV, search.getResultCode().getResultCodeName(), search, |
| | | search.getErrorMessage(), baseDn.toString()); |
| | | search.getErrorMessage(), baseDn); |
| | | return null; |
| | | } |
| | | |
| | |
| | | op.run(); |
| | | if (op.getResultCode() != ResultCode.SUCCESS) |
| | | { |
| | | logger.trace(DEBUG_ERROR_UPDATING_RUV, op.getResultCode().getResultCodeName(), |
| | | op.toString(), |
| | | op.getErrorMessage().toString(), |
| | | baseDn.toString()); |
| | | logger.trace(DEBUG_ERROR_UPDATING_RUV, |
| | | op.getResultCode().getResultCodeName(), op, op.getErrorMessage(), baseDn); |
| | | } |
| | | return op.getResultCode(); |
| | | } |
| | |
| | | this.creationTime = System.currentTimeMillis(); |
| | | |
| | | if (logger.isTraceEnabled()) |
| | | logger.trace(this.toString()); |
| | | logger.trace("new ErrorMsg=%s", this); |
| | | } |
| | | |
| | | /** |
| | |
| | | // This is probably a connection attempt from an unexpected client |
| | | // log that to warn the administrator. |
| | | logger.debug(INFO_SSL_SERVER_CON_ATTEMPT_ERROR, socket.getRemoteSocketAddress(), |
| | | socket.getLocalSocketAddress().toString(), |
| | | e.getLocalizedMessage()); |
| | | socket.getLocalSocketAddress(), e.getLocalizedMessage()); |
| | | return null; |
| | | } |
| | | finally |
| | |
| | | |
| | | sendTopoInfoToAllExcept(senderHandler); |
| | | |
| | | logger.info(NOTE_DIRECTORY_SERVER_CHANGED_STATUS, senderHandler.getServerId(), baseDN.toNormalizedString(), |
| | | newStatus.toString()); |
| | | logger.info(NOTE_DIRECTORY_SERVER_CHANGED_STATUS, |
| | | senderHandler.getServerId(), baseDN.toNormalizedString(), newStatus); |
| | | } |
| | | catch(Exception e) |
| | | { |
| | | logger.error(LocalizableMessage.raw( stackTraceToSingleLineString(e))); |
| | | logger.error(LocalizableMessage.raw(stackTraceToSingleLineString(e))); |
| | | } |
| | | finally |
| | | { |
| | |
| | | if (providedMsg != null) |
| | | { |
| | | if (logger.isTraceEnabled()) |
| | | logger.trace("In " + |
| | | ((handler != null) ? handler.toString() : "Replication Server") + |
| | | " closing session with err=" + providedMsg); |
| | | logger.trace("In %s closing session with err=%s", |
| | | ((handler != null) ? handler : "Replication Server"), providedMsg); |
| | | logger.error(providedMsg); |
| | | } |
| | | |
| | |
| | | * TODO : This should be handled by the repair functionality. |
| | | */ |
| | | logger.error(ERR_REPLICATIONDB_CANNOT_PROCESS_CHANGE_RECORD, replicationServer.getServerId(), |
| | | (csn == null ? "" : csn.toString()), |
| | | e.getMessage()); |
| | | csn, e.getMessage()); |
| | | } |
| | | } |
| | | return currentChange; |
| | |
| | | // backend |
| | | if (! backupDir.getConfigEntryDN().equals(cfg.dn())) |
| | | { |
| | | logger.error(ERR_BACKUPDB_CANNOT_BACKUP_IN_DIRECTORY, b.getBackendID(),backupLocation.getPath(), |
| | | backupDir.getConfigEntryDN().rdn(). |
| | | getAttributeValue(0).toString()); |
| | | logger.error(ERR_BACKUPDB_CANNOT_BACKUP_IN_DIRECTORY, b.getBackendID(), backupLocation.getPath(), |
| | | backupDir.getConfigEntryDN().rdn().getAttributeValue(0)); |
| | | return false ; |
| | | } |
| | | } |
| | |
| | | initState = TaskState.STOPPED_BY_ERROR; |
| | | } |
| | | |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("[IE] InitializeTask is ending with state:%s", |
| | | initState.toString()); |
| | | } |
| | | logger.trace("[IE] InitializeTask is ending with state: %s", initState); |
| | | return initState; |
| | | } |
| | | |
| | |
| | | if (dn != null // This is an ADD |
| | | && entry.getName().equals(DN.valueOf(dn))) |
| | | { |
| | | logger.debug(LocalizableMessage.raw(String.format("Entry %s found", entry.getName() |
| | | .toString()))); |
| | | logger.debug(LocalizableMessage.raw(String.format("Entry %s found", entry.getName()))); |
| | | alreadyExist = true; |
| | | } |
| | | writer.writeEntry(entry); |
| | |
| | | destinationSchemaEntry.getAttribute("attributeTypes").add( |
| | | attributeType); |
| | | changeCount++; |
| | | logger.debug(LocalizableMessage.raw(String.format("Added %s", attributeType |
| | | .toString()))); |
| | | logger.debug(LocalizableMessage.raw(String.format("Added %s", attributeType))); |
| | | } |
| | | } |
| | | |
| | |
| | | getSchemaElement(templateSchemaEntry, "objectClasses", oc); |
| | | destinationSchemaEntry.getAttribute("objectClasses").add(objectClass); |
| | | changeCount++; |
| | | logger.debug(LocalizableMessage.raw( |
| | | String.format("Added %s", objectClass.toString()))); |
| | | logger.trace("Added %s", objectClass); |
| | | } |
| | | } |
| | | |
| | |
| | | ReentrantReadWriteLock lock = oldTable.get(dn); |
| | | if (lock.isWriteLocked()) |
| | | { |
| | | logger.trace("Found stale write lock on " + |
| | | dn.toString()); |
| | | logger.trace("Found stale write lock on %s", dn); |
| | | } |
| | | else if (lock.getReadLockCount() > 0) |
| | | { |
| | | logger.trace("Found stale read lock on " + |
| | | dn.toString()); |
| | | logger.trace("Found stale read lock on %s", dn); |
| | | } |
| | | else |
| | | { |
| | | logger.trace("Found stale unheld lock on " + |
| | | dn.toString()); |
| | | logger.trace("Found stale unheld lock on %s", dn); |
| | | } |
| | | } |
| | | catch (Exception e) |
| | |
| | | { |
| | | logger.trace( |
| | | "Returning FALSE for equality component %s in filter " + |
| | | "%s because entry %s didn't have attribute type " + |
| | | "%s with value %s", |
| | | this, completeFilter, entry.getName(), |
| | | attributeType.getNameOrOID(), |
| | | assertionValue.getValue().toString()); |
| | | "%s because entry %s didn't have attribute type %s with value %s", |
| | | this, completeFilter, entry.getName(), attributeType.getNameOrOID(), assertionValue.getValue()); |
| | | } |
| | | return ConditionResult.FALSE; |
| | | } |